General

  • Target

    daed41395ba663bef2c52e3d1723ac46253a9008b582bb8d9da9cb0044991720

  • Size

    67KB

  • Sample

    211005-psbcmaaahj

  • MD5

    e6b0276bc3f541d8ff1ebb1b59c8bd29

  • SHA1

    295de44a0adbef57c51458978ccd71437aff0bf1

  • SHA256

    daed41395ba663bef2c52e3d1723ac46253a9008b582bb8d9da9cb0044991720

  • SHA512

    cdc851b9a7dc396384cbd69353f4e594cb3ac80679abfaa9ebf7bf849bca1b2e2c233c9634239e4aaa4e7f02a2af096733bef1b760ae0e6d660918217cecdcee

Malware Config

Extracted

Family

blackmatter

Version

1.2

Botnet

512478c08dada2af19e49808fbda5b0b

Credentials

  • Protocol:
    smtp
  • Port:
    587
  • Username:
    aheisler@hhcp.com
  • Password:
    120Heisler

  • Protocol:
    smtp
  • Port:
    587
  • Username:
    dsmith@hhcp.com
  • Password:
    Tesla2019

  • Protocol:
    smtp
  • Port:
    587
  • Username:
    administrator@hhcp.com
  • Password:
    iteam8**
C2

https://paymenthacks.com

http://paymenthacks.com

https://mojobiden.com

http://mojobiden.com

Attributes
  • attempt_auth

    true

  • create_mutex

    true

  • encrypt_network_shares

    true

  • exfiltrate

    true

  • mount_volumes

    true

rsa_pubkey.base64
aes.base64

Targets

    • Target

      daed41395ba663bef2c52e3d1723ac46253a9008b582bb8d9da9cb0044991720

    • Size

      67KB

    • MD5

      e6b0276bc3f541d8ff1ebb1b59c8bd29

    • SHA1

      295de44a0adbef57c51458978ccd71437aff0bf1

    • SHA256

      daed41395ba663bef2c52e3d1723ac46253a9008b582bb8d9da9cb0044991720

    • SHA512

      cdc851b9a7dc396384cbd69353f4e594cb3ac80679abfaa9ebf7bf849bca1b2e2c233c9634239e4aaa4e7f02a2af096733bef1b760ae0e6d660918217cecdcee

    Score
    3/10

MITRE ATT&CK Matrix

Tasks